Sciweavers

1316 search results - page 258 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 22 days ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 1 days ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
CP
2008
Springer
13 years 9 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
ETRA
2008
ACM
130views Biometrics» more  ETRA 2008»
13 years 9 months ago
Longitudinal evaluation of discrete consecutive gaze gestures for text entry
Eye-typing performance results are reported from controlled studies comparing an on-screen keyboard and EyeWrite, a new on-screen gestural input alternative. Results from the firs...
Jacob O. Wobbrock, James Rubinstein, Michael W. Sa...
NIPS
1997
13 years 8 months ago
Bayesian Model of Surface Perception
Image intensity variations can result from several different object surface effects, including shading from 3-dimensional relief of the object, or paint on the surface itself. An ...
William T. Freeman, Paul A. Viola